Results 61 to 70 of about 72,952 (289)

Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices

open access: yesIEEE Access, 2022
Continuous and low-cost broadcast authentication is a fundamental security service for distributed sensor networks. This paper presents a novel development of a continuous and low-overhead broadcast authentication protocol named enhanced Infinite timed ...
Khouloud Eledlebi   +5 more
doaj   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

The Message Authentication Code Based on Universal Hashing

open access: yesБезопасность информационных технологий, 2012
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
T. A. Bilyk, A. U. Nesterenko
doaj  

AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data ...
GURPREET K. SODHI, GURJOT S. GABA
doaj  

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

Multidimensional OMICs reveal ARID1A orchestrated control of DNA damage, splicing, and cell cycle in normal‐like and malignant urothelial cells

open access: yesMolecular Oncology, EarlyView.
Loss of the frequently mutated chromatin remodeler ARID1A, a subunit of the SWI/SNF cBAF complex, results in less open chromatin, alternative splicing, and the failure to stop cells from progressing through the cell cycle after DNA damage in bladder (cancer) cells. Created in BioRender. Epigenetic regulators, such as the SWI/SNF complex, with important
Rebecca M. Schlösser   +11 more
wiley   +1 more source

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +2 more sources

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

open access: yes, 2005
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the ...
Svozil, Karl
core   +2 more sources

Tonic signaling of the B‐cell antigen‐specific receptor is a common functional hallmark in chronic lymphocytic leukemia cell phosphoproteomes at early disease stages

open access: yesMolecular Oncology, EarlyView.
B‐cell chronic lymphocytic leukemia (B‐CLL) and monoclonal B‐cell lymphocytosis (MBL) show altered proteomes and phosphoproteomes, analyzed using mass spectrometry, protein microarrays, and western blotting. Identifying 2970 proteins and 316 phosphoproteins, including 55 novel phosphopeptides, we reveal BCR and NF‐kβ/STAT3 signaling in disease ...
Paula Díez   +17 more
wiley   +1 more source

Home - About - Disclaimer - Privacy